Skip to content

Security and trust at Phantom Browser.

How we protect your data, credentials, and sessions. Built with a managed infrastructure model where security is our responsibility, not yours.

Managed AI infrastructure

We operate the AI infrastructure. You never need to configure model access, manage credentials for a model provider, or wire up your own backend. There is nothing for you to install beyond the app itself. Traffic to and from the AI runs over TLS to our cloud servers in well-known regions.

What stays on your device

Browser session data, cookies, local logins, downloaded files, and anything you mark private in memory. These never leave your machine.

What we process in the cloud

Task instructions, the page snapshots and DOM excerpts the agent needs to reason, and the agent's planning steps. Retention windows are configurable in account settings.

Permission model

Approval gates for: purchases, payments, sending messages, deletions, downloads, logins, and file system access outside a working directory. Per-site allow and deny lists give you granular control.

Prompt-injection defense

The agent treats page content as untrusted data, never as instruction. Action grounding requires the action to match the user's task, not page text. Cross-site instruction isolation: a page on one domain cannot redirect a task targeted at another domain.

Credentials

Stored in the OS keychain or platform-equivalent secure storage. Never sent to the cloud in plaintext. The agent fills credentials at the page level; the cloud sees only that a login was completed, not the values.

Data handling

Encryption in transit (TLS 1.2+) and at rest. Configurable logging and retention windows. Data deletion on request.

Compliance posture

We are building toward formal certifications. We do not yet hold SOC 2 or ISO 27001. This section will be updated as our compliance posture evolves.

Responsible disclosure

Report vulnerabilities to security@phantombrowser.com. We commit to acknowledging reports within 48 hours, providing safe harbor for good-faith research, and publishing fixes transparently.

Subprocessors

A current list of subprocessors is maintained and available on request. Contact security@phantombrowser.com for the latest version.

Questions about security? Reach us at security@phantombrowser.com or visit our contact page.